vulnerability
SUSE: CVE-2023-5366: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:C/A:N) | Oct 6, 2023 | Nov 22, 2023 | Jan 28, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:C/A:N)
Published
Oct 6, 2023
Added
Nov 22, 2023
Modified
Jan 28, 2025
Description
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Solution(s)
suse-upgrade-libopenvswitch-2_13-0suse-upgrade-libopenvswitch-2_14-0suse-upgrade-libopenvswitch-3_1-0suse-upgrade-libovn-20_03-0suse-upgrade-libovn-20_06-0suse-upgrade-libovn-23_03-0suse-upgrade-openvswitchsuse-upgrade-openvswitch-develsuse-upgrade-openvswitch-docsuse-upgrade-openvswitch-ipsecsuse-upgrade-openvswitch-pkisuse-upgrade-openvswitch-testsuse-upgrade-openvswitch-vtepsuse-upgrade-openvswitch3suse-upgrade-openvswitch3-develsuse-upgrade-openvswitch3-docsuse-upgrade-openvswitch3-ipsecsuse-upgrade-openvswitch3-pkisuse-upgrade-openvswitch3-testsuse-upgrade-openvswitch3-vtepsuse-upgrade-ovnsuse-upgrade-ovn-centralsuse-upgrade-ovn-develsuse-upgrade-ovn-docsuse-upgrade-ovn-dockersuse-upgrade-ovn-hostsuse-upgrade-ovn-vtepsuse-upgrade-ovn3suse-upgrade-ovn3-centralsuse-upgrade-ovn3-develsuse-upgrade-ovn3-docsuse-upgrade-ovn3-dockersuse-upgrade-ovn3-hostsuse-upgrade-ovn3-vtepsuse-upgrade-python3-ovssuse-upgrade-python3-ovs3

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.